2008 First International Conference on the Applications of Digital Information and Web Technologies (ICADIWT)最新文献

筛选
英文 中文
Signing the document content is not enough: A new attack to digital signature 仅对文档内容进行签名是不够的:一种针对数字签名的新攻击
F. Buccafurri, G. Caminiti, G. Lax
{"title":"Signing the document content is not enough: A new attack to digital signature","authors":"F. Buccafurri, G. Caminiti, G. Lax","doi":"10.1109/ICADIWT.2008.4664402","DOIUrl":"https://doi.org/10.1109/ICADIWT.2008.4664402","url":null,"abstract":"Digital signature represents the only valid method to give signed electronic documents probative value at least as traditional documents with handwritten signature. The above claim has a full counterpart with the current law system of most countries, so that the process of document dematerialization has been already started relying on the current infrastructures as well as the current juridical regulations, with strong attention towards common interoperability rules. As a consequence, the issue regarding the vulnerabilities of digital signature is particularly important. This paper presents a new attack to digital signature not based on the insertion of instructions in the document to sign but in the same way producing a non-static visualization of the signed document, with the purpose of producing (legal) effects different from those desired by the signer. The paper proves the attack by example and gives a possible way to contrast it.","PeriodicalId":189871,"journal":{"name":"2008 First International Conference on the Applications of Digital Information and Web Technologies (ICADIWT)","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-10-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121077285","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Book embedding of the k-ary hypercube k元超立方体的书嵌入
S. Bettayeb, D. Hoelzeman
{"title":"Book embedding of the k-ary hypercube","authors":"S. Bettayeb, D. Hoelzeman","doi":"10.1109/ICADIWT.2008.4664384","DOIUrl":"https://doi.org/10.1109/ICADIWT.2008.4664384","url":null,"abstract":"Graph embeddings play an important role in interconnection network and VLSI design. Determining the number of layers required to build a VLSI chip is just one of the many areas in which graph embeddings are used. A type of embedding that is helpful in determining the number of layers is a book embedding. We develop upper and lower bounds on the pagenumber of a book embedding of the k-ary hypercube along with an upper bound on the cumulative pagewidth.","PeriodicalId":189871,"journal":{"name":"2008 First International Conference on the Applications of Digital Information and Web Technologies (ICADIWT)","volume":"83 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-10-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121056116","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
User-based meta-search with the co-citation graph 基于用户的元搜索和共引图
A. Keyhanipour, M. Piroozmand, A. Bidoki, K. Badie
{"title":"User-based meta-search with the co-citation graph","authors":"A. Keyhanipour, M. Piroozmand, A. Bidoki, K. Badie","doi":"10.1109/ICADIWT.2008.4664410","DOIUrl":"https://doi.org/10.1109/ICADIWT.2008.4664410","url":null,"abstract":"Although there are numerous search engines in the Web environment, no one could claim producing reliable results in all conditions. This problem is becoming more serious considering the exponential growth of the number of Web resources. In the response to these challenges, the meta-search engines are introduced to enhance the search process by devoting some outstanding search engines as their information resources. In recent years, some approaches are proposed to handle the result combination problem which is the fundamental problem in the meta-search environment. In this paper, a new merging/re-ranking method is introduced which uses the characteristics of the Web co-citation graph that is constructed from search engines and returned lists. The information extracted from the co-citation graph, is combined and enriched by the userspsila click-through data as their implicit feedback in an adaptive framework. Experimental results show a noticeable improvement against the basic method as well as some well-known meta-search engines.","PeriodicalId":189871,"journal":{"name":"2008 First International Conference on the Applications of Digital Information and Web Technologies (ICADIWT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-10-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122864043","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Incremental maintenance of horizontal view using PIVOT operation and differential files in relational DBMSs 在关系dbms中使用PIVOT操作和差异文件对水平视图进行增量维护
Sung-Hyun Shin, Jinho Kim, Yang-Sae Moon, Sang-Wook Kim
{"title":"Incremental maintenance of horizontal view using PIVOT operation and differential files in relational DBMSs","authors":"Sung-Hyun Shin, Jinho Kim, Yang-Sae Moon, Sang-Wook Kim","doi":"10.1109/ICADIWT.2008.4664356","DOIUrl":"https://doi.org/10.1109/ICADIWT.2008.4664356","url":null,"abstract":"To analyze multidimensional data conveniently and efficiently, OLAP(online analytical processing) systems are widely using views with horizontal form to represent measurement values over multiple dimensions, while conventional RDBMSs usually manage tables with vertical form. In this paper, we propose an incremental maintenance of these horizontal views which updates efficiently them according to the changes of base source tables. We first propose an overall framework processing queries over horizontal views transformed from source tables with vertical form. In order to execute this view maintenance process efficiently, we keep every changes of source tables into differential files then we modify the horizontal views with the differential files. Because differential files have vertical forms, their tuples are converted to horizontal forms which are identical to horizontal views then they are applied to the maintenance of these views. Experimental results show that the proposed method is more effective than existing methods.","PeriodicalId":189871,"journal":{"name":"2008 First International Conference on the Applications of Digital Information and Web Technologies (ICADIWT)","volume":"93 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-10-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132713140","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Dedicated hardware architecture for cycle crossover operation 周期交叉操作专用硬件架构
M. Yoshikawa, Kentaro Otsuka, H. Terai
{"title":"Dedicated hardware architecture for cycle crossover operation","authors":"M. Yoshikawa, Kentaro Otsuka, H. Terai","doi":"10.1109/ICADIWT.2008.4664368","DOIUrl":"https://doi.org/10.1109/ICADIWT.2008.4664368","url":null,"abstract":"This paper discusses new dedicated hardware architecture for crossover operation in order to achieve high speed processing. The proposed architecture is based on cycle crossover algorithm which has superior search performance. It achieves not only high speed processing, but also reduction of the number of processing steps to obtain a solution. In order to evaluate the proposed architecture, we design the proposed architecture by using Verilog-HDL, and conduct logic simulation and logic synthesis. Simulation results prove the effectiveness of the proposed architecture in comparison with conventional software processing.","PeriodicalId":189871,"journal":{"name":"2008 First International Conference on the Applications of Digital Information and Web Technologies (ICADIWT)","volume":"129 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-10-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131921838","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Recognition of Arabic Sign Language (ArSL) using recurrent neural networks 基于递归神经网络的阿拉伯手语识别
M. Maraqa, Farid Al-Zboun, Mufleh Dhyabat, R. A. Zitar
{"title":"Recognition of Arabic Sign Language (ArSL) using recurrent neural networks","authors":"M. Maraqa, Farid Al-Zboun, Mufleh Dhyabat, R. A. Zitar","doi":"10.1109/ICADIWT.2008.4664396","DOIUrl":"https://doi.org/10.1109/ICADIWT.2008.4664396","url":null,"abstract":"The objective of this paper is to introduce the use of two different recurrent neural networks in human hand gesture recognition for static images. Because neural networks are a promising tool for many human computer interaction applications, this paper focuses on the ability of neural networks to assist in Arabic Sign Language(ArSL) hand gesture recognition. We have introduced the steps of our proposed system and have presented the Elmanpsilas model as a partially recurrent architecture and a fully connected network with recurrent links that is believed to help the network to converge and gain stability, then we have tested it in an experiment held for this; the results of the experiment have showed that the suggested system with the fully recurrent architecture has had a performance with an accuracy rate 95%.","PeriodicalId":189871,"journal":{"name":"2008 First International Conference on the Applications of Digital Information and Web Technologies (ICADIWT)","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-10-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124132495","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 150
APA Labs: An experimental web-based platform for the retrieval and analysis of news articles APA实验室:一个基于网络的实验平台,用于检索和分析新闻文章
W. Kienreich, E. Lex, C. Seifert
{"title":"APA Labs: An experimental web-based platform for the retrieval and analysis of news articles","authors":"W. Kienreich, E. Lex, C. Seifert","doi":"10.1109/ICADIWT.2008.4664318","DOIUrl":"https://doi.org/10.1109/ICADIWT.2008.4664318","url":null,"abstract":"In this paper, we present APA Labs, an experimental, Web-based platform supporting retrieval and analysis in the news archives of the Austrian Press Agency. APA Labs has been designed as a combination of a rich internet application with a modular system of interactive visualizations backed by server-side entity extraction and three-dimensional rendering capability. This paper outlines concepts and implementation details of APA Labs and presents several visualization modules based on research results from the field of Information and Knowledge visualization.","PeriodicalId":189871,"journal":{"name":"2008 First International Conference on the Applications of Digital Information and Web Technologies (ICADIWT)","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-10-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129921997","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Disclosure prevention in XML XML中的披露预防
N. N. Mohy, M. El-Sharkawi
{"title":"Disclosure prevention in XML","authors":"N. N. Mohy, M. El-Sharkawi","doi":"10.1109/ICADIWT.2008.4664412","DOIUrl":"https://doi.org/10.1109/ICADIWT.2008.4664412","url":null,"abstract":"Information security is considered the most serious requirement which must be carefully considered. Traditional security mechanism protects data at physical level such as encryption and access control, but todaypsilas organizations need to protect data on both levels physical and logical level. Since the organizationpsilas data may be published and shared by many users. Disclosure is a result of weakness of these security mechanisms. In this paper we discuss the problem of protecting XML data at logical level specifically solve the disclosure problem. The objective is to prevent an unauthorized user to infer sensitive information through the data they authorized to access (result of previous queries), integrity constraints, and using inferences. In most existing access control approaches the XML elements specified by access policies are either accessible or inaccessible according to their sensitivity. However, in some cases, the original XML elements are sensitive and inaccessible, but after being processed in some appropriate ways, the results become insensitive and thus accessible [6]. We propose a security mechanism called Disclosure Prevention Algorithm (DPA) that enhances both the security (by preventing disclosure) and availability (by considering suspected users only) of data represented in XML format.","PeriodicalId":189871,"journal":{"name":"2008 First International Conference on the Applications of Digital Information and Web Technologies (ICADIWT)","volume":"60 24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-10-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122360298","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Watermarking relational database systems 水印关系数据库系统
A. Odeh, A. Al-Haj
{"title":"Watermarking relational database systems","authors":"A. Odeh, A. Al-Haj","doi":"10.1109/ICADIWT.2008.4664357","DOIUrl":"https://doi.org/10.1109/ICADIWT.2008.4664357","url":null,"abstract":"Watermarking relational databases is an emerging research area that deals with the legal issue of copyright protection of relational databases. In this paper, we propose an efficient database watermarking algorithm based on inserting a binary image watermark in the dasiatimepsila attribute of database tuples. Experimental results demonstrate the robustness of the proposed algorithm against common database attacks.","PeriodicalId":189871,"journal":{"name":"2008 First International Conference on the Applications of Digital Information and Web Technologies (ICADIWT)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-10-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127496233","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 16
Improving Wireless Sensor Network efficiency and adaptability through an SOS server agent 通过SOS服务器代理提高无线传感器网络的效率和适应性
N. Jabeur, J. D. McCarthy, P. Graniero
{"title":"Improving Wireless Sensor Network efficiency and adaptability through an SOS server agent","authors":"N. Jabeur, J. D. McCarthy, P. Graniero","doi":"10.1109/ICADIWT.2008.4664383","DOIUrl":"https://doi.org/10.1109/ICADIWT.2008.4664383","url":null,"abstract":"Advances in hardware management, network protocols, operating systems, and applications are promoting large-scale deployment of Wireless Sensor Networks (WSNs). However, the challenge still remains to optimize the use of available computing, communication, and power resources while fulfilling data collection tasks. We think that exploiting a broader range of the networkpsilas intrinsic properties can be helpful in providing users with the right data, at the right time, using the right sensors deployed in the right spatial areas. To this end, in this paper we propose a Sensor Observation Service server agent that uses semantic, logical, and physical connections between sensors in order to create a Data Gathering Network (DGN) on-the-fly that can better adapt to network changes and provide adjustable services to clients of the network.","PeriodicalId":189871,"journal":{"name":"2008 First International Conference on the Applications of Digital Information and Web Technologies (ICADIWT)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-10-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114933077","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信